Incident-centered information security: Managing a strategic balance between prevention and response

Information & Management - Tập 51 - Trang 138-151 - 2014
Richard Baskerville1, Paolo Spagnoletti2, Jongwoo Kim3
1Georgia State University, CIS Department, 35 Broad Street NW, PO Box 4015, Atlanta, GA 30302, USA
2LUISS Guido Carli, Research Center on Information Systems (CeRSI), Via G. Alberoni 7, 00198 Roma, Italy
3University of Massachusetts Boston, MSIS Department, 100 Morrissey Boulevard, Boston, MA 02425, USA

Tài liệu tham khảo

Åhlfeldt, 2007, 73 Albright, 2010, Detecting and disrupting illicit nuclear trade after AQ Khan, The Washington Quarterly, 33, 85, 10.1080/01636601003673857 Antunes, 2010, Vulnerability discovery with attack injection, IEEE Transactions on Software Engineering, 36, 357, 10.1109/TSE.2009.91 Argyris, 1977, Double loop learning in organizations, Harvard Business Review, 55, 115 Bahill, 2009, An industry standard risk analysis technique, Engineering Management Journal, 21, 16, 10.1080/10429247.2009.11431841 Baskerville, 1988 Baskerville, 1991, Risk analysis: an interpretive feasibility tool in justifying information systems security, European Journal of Information Systems, 1, 121, 10.1057/ejis.1991.20 Baskerville, 2005, Warfare: a comparative framework for business information security, Journal of Information Systems Security, 1, 23 Berghel, 2007, Better-than-nothing security practices, Communications of the ACM, 50, 15, 10.1145/1278201.1278222 Boyer, 2008, Ideal based cyber security technical metrics for control systems, 246 Bradbury, 2010, Shadows in the cloud: Chinese involvement in advanced persistent threats, Network Security, 2010, 16, 10.1016/S1353-4858(10)70058-1 Brand, 2007 Carr, 2013 Cassini, 2008, Laws and regulations dealing with information security and privacy: an investigative study, International Journal of Information Security and Privacy, 2, 70, 10.4018/jisp.2008040105 Chow, 2009, Determinants of the critical success factor of disaster recovery planning for information systems, Information Management & Computer Security, 17, 248, 10.1108/09685220910978103 Darke, 1998, Successfully completing case study research: combining rigour, relevance and pragmatism, Information Systems Journal, 8, 273, 10.1046/j.1365-2575.1998.00040.x Denning, 1999 Ekmekci, 2010, Agility in higher education: planning for business continuity in the face of an H1N1 pandemic, SAM Advanced Management Journal, 75, 20 Fink, 2010, Information technology outsourcing through a configurational lens, The Journal of Strategic Information Systems, 19, 124, 10.1016/j.jsis.2010.05.004 Furnell, 2000, A conceptual architecture for real-time intrusion monitoring, Information Management & Computer Security, 8, 65, 10.1108/09685220010321317 Hagen, 2009, Human relationships a never-ending security education challenge?, IEEE Security & Privacy, 7, 65, 10.1109/MSP.2009.92 Hanseth, 2010, Design theory for dynamic complexity in information infrastructures: the case of building internet, Journal of Information Technology, 25, 1, 10.1057/jit.2009.19 Hu, 2011, Does deterrence work in reducing information security policy abuse by employees?, Communications of the ACM, 54, 54, 10.1145/1953122.1953142 Huberman, 2002 ISECOM, 2012 ISO/IEC, 2013 Issac, 2007, War driving WLAN security issues-attacks, security design and remedies, Information Systems Management, 24, 289, 10.1080/10580530701585831 Jajodia, 1999, Trusted recovery, association for computing machinery, Communications of the ACM, 42, 71, 10.1145/306549.306580 Jensen, 2010, Cyber warfare precautions against the effects of attacks, Texas Law Review, 88, 1533 Kendall, 2005, Understanding disaster recovery planning through a theatre metaphor: rehearsing for a show that might never open, Communications of the Association for Information Systems, 16, 1001 Kephart, 1993, Computers and epidemiology, IEEE Spectrum, 30, 20, 10.1109/6.275061 Kim, 2012, Possibility-based ERM, Cutter IT Journal, 25, 11 Lai, 2008, Java insecurity: accounting for subtleties that can compromise code, IEEE Software, 25, 13, 10.1109/MS.2008.9 Landoll, 2006 Leonardi, 2011, When flexible routines meet flexible technologies: affordance, constraint, and the imbrication of human and material agencies, MIS Quarterly, 35, 147, 10.2307/23043493 March, 1991, Exploration and exploitation in organizational learning, Organization Science, 2, 71, 10.1287/orsc.2.1.71 Markus, 1988, Information technology and organizational change: causal structure in theory and research, Management Science, 34, 583, 10.1287/mnsc.34.5.583 Martin, 2009 Page, 2003, Evaluating security in software agent systems using a security analysis tool Parker, 1981 PCI Security Standards Council, PCI DSS Requirements and Security Assessment Procedures, Version 2.0, Retrieved on February, 2013 from PCI Security Standards Council (2010), https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf. Resca, 2013, Digital platforms as sources for organizational and strategic transformation: a case study of the midblue project, Journal of Theoretical and Applied e-Commerce Research, 8, 71 Richardson, 2010 Siponen, 2006, Six design theories for IS security policies and guidelines, Journal of the Association for Information systems, 7, 445, 10.17705/1jais.00095 Siponen, 2009, Information security management standards: problems and solutions, Information & Management, 46, 267, 10.1016/j.im.2008.12.007 Sood, 2012, Cybercrime dissecting the state of underground enterprise, IEEE Internet Computing, 17, 60, 10.1109/MIC.2012.61 Spagnoletti, 2011, Exploring the interplay between floss adoption and organisational innovation, Communications of the Association for Information Systems, 29, 279 Spagnoletti, 2008, The duality of information security management: fighting against predictable and unpredictable threats, Journal of Information System Security, 4, 46 Stephenson, 2004, Managing digital incidents – a background, Computer Fraud & Security, 2004, 17, 10.1016/S1361-3723(05)70186-X Tong, 2003, Implementation of ISO17799 and BS7799 in picture archiving and communication system: local experience in implementation of BS7799 standard Tsohou, 2008, Process-variance models in information security awareness research, Information Management & Computer Security, 16, 271, 10.1108/09685220810893216 Verizon Risk Team, 2012 Walsham, 1995, Interpretive case studies in IS research: nature and method, European Journal of Information Systems, 4, 74, 10.1057/ejis.1995.9 Walsham, 2006, Doing interpretive research, European Journal of Information Systems, 15, 320, 10.1057/palgrave.ejis.3000589 Ward, 2009, Recognizing the impact of E-discovery amendments on electronic records management, Information Systems Management, 26, 350, 10.1080/10580530903245721 Werlinger, 2010, Preparation, detection, and analysis: the diagnostic work of IT security incident response, Information Management & Computer Security, 18, 26, 10.1108/09685221011035241 Willison, 2010, The expanded security action cycle: a temporal analysis ‘Left of Bang’ Willison, 2013, Beyond deterrence an expanded view of employee computer abuse, MIS Quarterly, 37, 1, 10.25300/MISQ/2013/37.1.01 Yin, 2009